For cybersecurity, let bipartisanship succeedThe Hill (blog)One of which is passing cybersecurity legislation. Cyber efforts haven't garnered much press so far for two simple reasons. First, unlike the budget and the Keystone XL pipeline, cyberproposals only recently became mired in entrenched political ...

US Cyber Challenge Calling All Future Cyber Defenders to Compete!MarketWatch (press release)The National Board of Information Security Examiners, through the US Cyber Challenge Initiative, today announced its Cyber Quest competition, a fun and challenging online contest open to high school and college students who will compete against their ...

Is DHS ready to oversee private cybersecurity?Federal Times11 terrorist attacks, NRC began issuing advisories and other notices directing companies it regulates to improve the physical and cyber protection of their nuclear power plants, said Craig Erlanger, who oversees NRC's Cyber Security and Integrated ...

Mac hacker attack hits more than 600000 computersSan Francisco ChronicleApple fixed a security hole this week that let the malicious software spread. Users who haven't downloaded the necessary updates are vulnerable, Doctor Web said. "This once again refutes claims by some experts that there are no cyber-threats to Mac OS ...

Al-Qaeda online forum back after blackoutPakistan ObserverWashington—One of al-Qaeda's primary Web forums was back online Wednesday after a lengthy blackout that analysts said appeared to have the hallmarks of a cyber attack. The outages extended to at least five other sites associated with al-Qaeda, ...

China admits sites hit in hacking attackCNNThe cyber attackers plastered the sites with subversive messages, condemning what they described as Beijing's "evil regime" and warning "Your government has been in control of your network and filters harmful things. Careful." While official news sites ...

Did the US just start a cyber war with al-Qaeda?RTAfter several al-Qaeda linked websites went offline recently, questions have been asked regarding whether or not the United States has involved itself in a cyber war against its most noted foe. Several online forums frequently visited by al-Qaeda ...RT

Arizona's Cyber-Bullying Law May Be RevisedWebProNewsBy Heather Campobello · 56 mins ago · Leave a Comment Arizona's cyber-bullying law has passed both the state House and Senate. House Bill 2549 law will become official once Governor Jan Brewer approves the piece of legislation.

Draconian Cybersecurity BillsThe People's Voiceby Stephen Lendman On March 8, the Department of Homeland Security (DHS) conducted a mock New York cyber attack. At issue was gaining support for pending Senate legislation. White House spokesperson Caitlin Hayden called the stunt a way to give ...The People's Voice

Al Qaeda Sites Taken Down by Cyber AttackeSecurity PlanetFive key online forums were taken down two weeks ago by an apparent DDoSattack. By Jeff Goldman | April 05, 2012 The Christian Science Monitor reports that five key online forums promoting al Qaeda were taken down two weeks ago by an apparent DDoS ...eSecurity Planet

Battling Hackers: The Game of CybersecurityMidsize InsiderThe same goes for the many security enthusiasts who fight back against them--which is one reason why Britain's Cyber Security Challenge event is seeking to enlist amateur talent for the ongoing struggle against hacking attacks. Amateurs are integral to ...

Apple computers target of malware attackToronto StarMichael Lewis Business Reporter A malware outbreak called Flashback Trojan that has infected more than 650000 Apple Inc. computers has likely peaked, says the director of a Russia-based antivirus vendor that has been charting the cyber-attack.

When Online Hacking Poses Real-World DangersNPR (blog)Anonymous is a broad, largely disorganized movement, built around the idea of cyber-civil disobedience. I think the China attacks speak to that. There are dozens, probably hundreds of different types of actions talked about in Anonymous chat rooms.

Fighting security threats: May the force be with youCSO"In 2011, we saw the IT industry continuing to improve the quality of software, but at the same time, cyber criminals are evolving their techniques, taking advantage of the high penetration of mobile devices and the prevalence of social media use, ...

Global Internet Slowdown: Is Anonymous to Blame?MashableAsia's cyber backbone was especially hard hit, seeing packet loss of 33% or more, according to the monitoring website Internet Traffic Report. Anonymous, a loosely knit group of hackers, took credit for defacing up to 500 Chinese websites Thursday, ...

Final Day of FOSE Featured an Impressive Panel of Women in TechnologyMarketWatch (press release)The Cyber Attack demo presented by Mischel Kwon of Mischel Kwon and Associates and Government Computer News' Technology Analyst, Greg Crowe, showed a standing-room-only audience the step-by-step patterns and methodologies for detecting attacks on an ...

Is mobile security a losing game?FCW.comBy Amber Corrin The surge of network-connected mobile devices has introduced a new kind of threat to an already crowded cyber landscape, and with it a new kind of concern: mobilesecurity. With an increasing number of workers from both the federal and ...

Cybersecurity bills raise privacy and civil liberties concernsFierceGovernmentITalso contain language that permits cyber information shared with the government to be used for other purposes, according to a CDT analysis (.pdf) of four major cybersecurity bills under consideration. That ability to share information gained through ...

Registration for CyberPatriot V Now Open!Sacramento BeeEstablished by the Air Force Association, CyberPatriot was created to inspire high school students toward careers in cyber security or other science, technology, engineering and mathematics (STEM) disciplines. CyberPatriot offers valuable skills for ...

2012 Cybersecurity SymposiumBlackEngineer.comOne of the highlights at the symposium is the Cybersecurity Career Fair. The CACI & CCGCyber Security Symposium will provide college students with an understanding of the cybersecurity profession and the many pathways to enter this growing field.

Deterring State-Sponsored Cyber Attacks: Intelligence and the ...By Jon DiamondUntil a state casts off the cloak of plausible deniability and unilaterally claims responsibility for acyber attack, we may safely assume that imperfect attribution will remain an integral feature ofcyber conflict. We may likewise reasonably assume .... Thus, rather than the current catch-all, state-centric approach, future U.S. cyber security policy should be built upon strong, reliable intelligence and an smart, incisive counterinsurgency-style deterrence. [i] Department of Defense. Department ...Sigma Iota Rho Journal

Chicago Summit: Nuclear NATO, Global Missile Shield, Cyber WarfareBy richardrozoffThe term “global security network” used in reference to an organization that has waged air and ground wars against small nations on three continents in the past 13 years is a candidate for the most ludicrous and cynical misuse of euphemism ... With all four issues here discussed – American nuclear weapons in Europe, the U.S.-NATO missile shield, cyber warfare capabilities on the continent and increasingly more assertive energy strategies – it would be advised to mentally insert the ...Stop NATO

Cybersecurity Roundup: Online Attacks Bigger US Threat Than ...By Constantine von HoffmanThe FBI says online threats could soon surpass terrorism and become the number one nationalsecurity threat; Facebook apps for Android and iOS expose sensitive user information; Forbes publishes a list of hacker prices for OS exploits; and ... threat than traditional terrorism: Speaking at the GovSec Conference, Ralph Boelter, assistant director of the counterterrorism division at the FBI, predicted "You'll see a greater prevalence of cyber-related offenses, including cyber-terrorism.CIO Blogs

European Union's proposal could make the production or use of ...By Tyler LeeEssentially this would make it impossible for security companies to create tools to test their ownsecurity, or the security of others since it technically could be used as a cyber attack by others with less noble intentions. While the majority of the ...Ubergizmo

Friday News & Notes - Digital Bond SCADA Security PortalBy Dale G PetersonICS Security News DHS released version 4.1 of their Cyber Security Evaluation Tool (CSET). This version adds Visio support for network diagrams. CSET is a good do-it-yourself option for those who can't afford pricey consultants like Digital Bond. I hope to give it a ... DHS should be providing detailed info on the attack particularly any elements that are ICS specific in method or targeting, omitting company name, IP addresses and other company identifying details of course. This week ...Digital Bond's SCADA Security Portal

The USA, Not Dictatorships the Internet's Biggest EnemyBy Hrafnkell HaraldssonNow comes the U.S. House of Representatives and its Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), otherwise known as H.R. 3523, backed by over 100 members of Congress (twice SOPA's support). ... Ruppersberger (D-MD), the Chairman and Ranking Member of the House Intelligence Committee says that it is written “To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity ...PoliticusUSA

Beijing SHOTS » China to publish privacy protection standardsBy KalindaThe situation escalated within days, as several popular social networking and gaming websites also fell victim to a cyber attack, with the personal details of millions of subscribers being published. In response to these leaks, the MIIT issued a notice on Dec. 28, asking Internet service providers ... He described the security of their records at present as like “money put in banks made of paper.” The new guidelines will clarify basic principles for personal information protection and provide ...Beijing SHOTS

CISPA: Son Of SOPA Threatens Internet Freedom | Addicting InfoBy Michael PatricksonCISPA, H.R. 3523, is meant “to provide for the sharing of certain cyber threat intelligence andcyber threat information between the intelligence community and cybersecurity entities, and for other purposes.” According to a press release issued ...Addicting Info

ICF Team Takes 2nd In Global Cyber CompetitionBy Ross WilkersICF Team Takes 2nd In Global Cyber Competition. An ICF International team has won second place at a global cybersecurity competition, the company announced Thursday. Senior Vice President William Jacob said the team demonstrated ...GovCon Executive

The 4th Media » How the US and Israel are Shredding the NPT ...By Kiyul ChungMeanwhile, in the face of crippling economic sanctions, heightened political pressure, cybersabotage, assassinations of nuclear scientists, and threats of military attack, the Iranians remain steady in their drive toward what from all credible evidence is a peaceful .... There can be no meaningful “contract” without an internationalization of security arrangements that, in the end, will require a dismantling of the American warfare state that underpins its nuclear outlawry and that of its clients.The 4th Media